Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2215 Full-Text Articles 2495 Authors 544962 Downloads 104 Institutions

All Articles in Software Engineering

Faceted Search

2215 full-text articles. Page 6 of 72.

Real-Time Vision-Based Lane Detection With 1d Haar Wavelet Transform On Raspberry Pi, Vikas Reddy Sudini 2017 Utah State University

Real-Time Vision-Based Lane Detection With 1d Haar Wavelet Transform On Raspberry Pi, Vikas Reddy Sudini

All Graduate Theses and Dissertations

Rapid progress is being made towards the realization of autonomous cars. Since the technology is in its early stages, human intervention is still necessary in order to ensure hazard-free operation of autonomous driving systems. Substantial research efforts are underway to enhance driver and passenger safety in autonomous cars. Toward that end GreedyHaarSpiker, a real-time vision-based lane detection algorithm is proposed for road lane detection in different weather conditions. The algorithm has been implemented in Python 2.7 with OpenCV 3.0 and tested on a Raspberry Pi 3 Model B ARMv8 1GB RAM coupled to a Raspberry Pi camera board ...


Discovering Anomalous Events From Urban Informatics Data, Kasthuri JAYARAJAH, Vigneshwaran SUBBARAJU, Dulanga KAVEESHA WEERAKOON MUDIYANSELAGE, Archan MISRA, La Thanh TAM, Noel ATHAIDE 2017 Singapore Management University

Discovering Anomalous Events From Urban Informatics Data, Kasthuri Jayarajah, Vigneshwaran Subbaraju, Dulanga Kaveesha Weerakoon Mudiyanselage, Archan Misra, La Thanh Tam, Noel Athaide

Research Collection School Of Information Systems

Singapore's "smart city" agenda is driving the government to provide public access to a broader variety of urban informatics sources, such as images from traffic cameras and information about buses servicing different bus stops. Such informatics data serves as probes of evolving conditions at different spatiotemporal scales. This paper explores how such multi-modal informatics data can be used to establish the normal operating conditions at different city locations, and then apply appropriate outlier-based analysis techniques to identify anomalous events at these selected locations. We will introduce the overall architecture of sociophysical analytics, where such infrastructural data sources can be ...


What Do Developers Search For On The Web?, Xin XIA, Lingfeng BAO, David LO, Pavneet Singh KOCHHAR, Ahmed E. HASSAN, Zhenchang XING 2017 Singapore Management University

What Do Developers Search For On The Web?, Xin Xia, Lingfeng Bao, David Lo, Pavneet Singh Kochhar, Ahmed E. Hassan, Zhenchang Xing

Research Collection School Of Information Systems

Developers commonly make use of a web search engine such as Google to locate online resources to improve their productivity. A better understanding of what developers search for could help us understand their behaviors and the problems that they meet during the software development process. Unfortunately, we have a limited understanding of what developers frequently search for and of the search tasks that they often find challenging. To address this gap, we collected search queries from 60 developers, surveyed 235 software engineers from more than 21 countries across five continents. In particular, we asked our survey participants to rate the ...


Clustering Classes In Packages For Program Comprehension, Xiaobing SUN, Xiangyue LIU, Bin LI, Bixin LI, David LO, Lingzhi LIAO 2017 Singapore Management University

Clustering Classes In Packages For Program Comprehension, Xiaobing Sun, Xiangyue Liu, Bin Li, Bixin Li, David Lo, Lingzhi Liao

Research Collection School Of Information Systems

During software maintenance and evolution, one of the important tasks faced by developers is to understand a system quickly and accurately. With the increasing size and complexity of an evolving system, program comprehension becomes an increasingly difficult activity. Given a target system for comprehension, developers may first focus on the package comprehension. The packages in the system are of different sizes. For small-sized packages in the system, developers can easily comprehend them. However, for large-sized packages, they are difficult to understand. In this article, we focus on understanding these large-sized packages and propose a novel program comprehension approach for large-sized ...


Characterizing Malicious Android Apps By Mining Topic-Specific Data Flow Signatures, XInli YANG, David LO, Li LI, Xin XIA, Tegawendé F. BISSYANDE, Jacques KLEIN 2017 Singapore Management University

Characterizing Malicious Android Apps By Mining Topic-Specific Data Flow Signatures, Xinli Yang, David Lo, Li Li, Xin Xia, Tegawendé F. Bissyande, Jacques Klein

Research Collection School Of Information Systems

Context: State-of-the-art works on automated detection of Android malware have leveraged app descriptionsto spot anomalies w.r.t the functionality implemented, or have used data flow information as afeature to discriminate malicious from benign apps. Although these works have yielded promising performance,we hypothesize that these performances can be improved by a better understanding of maliciousbehavior.Objective: To characterize malicious apps, we take into account both information on app descriptions,which are indicative of apps’ topics, and information on sensitive data flow, which can be relevant todiscriminate malware from benign apps.Method: In this paper, we propose a topic-specific approach ...


Related-Key Secure Key Encapsulation From Extended Computational Bilinear Diffie–Hellman, Brandon QIN, Shengli LIU, Shifeng SUN, Robert H. DENG, Dawu GU 2017 Singapore Management University

Related-Key Secure Key Encapsulation From Extended Computational Bilinear Diffie–Hellman, Brandon Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu

Research Collection School Of Information Systems

As a special type of fault injection attacks, Related-Key Attacks (RKAs) allow an adversary to manipulate a cryptographic key and subsequently observe the outcomes of the cryptographic scheme under these modified keys. In the real life, related-key attacks are already practical enough to be implemented on cryptographic devices. To avoid cryptographic devices suffering from related-key attacks, it is necessary to design a cryptographic scheme that resists against such attacks. This paper proposes an efficient RKA-secure Key Encapsulation Mechanism (KEM), in which the adversary can modify the secret key sk to any value f(sk), as long as, f is a ...


Modeling Topics And Behavior Of Microbloggers: An Integrated Approach, Tuan Anh HOANG, Ee-peng LIM 2017 Singapore Management University

Modeling Topics And Behavior Of Microbloggers: An Integrated Approach, Tuan Anh Hoang, Ee-Peng Lim

Research Collection School Of Information Systems

Microblogging encompasses both user-generated content and behavior. When modeling microblogging data, one has to consider personal and background topics, as well as how these topics generate the observed content and behavior. In this article, we propose the Generalized Behavior-Topic (GBT) model for simultaneously modeling background topics and users' topical interest in microblogging data. GBT considersmultiple topical communities (or realms) with different background topical interests while learning the personal topics of each user and the user's dependence on realms to generate both content and behavior. This differentiates GBT from other previous works that consider either one realm only or content ...


Metafork: A Compilation Framework For Concurrency Models Targeting Hardware Accelerators, Xiaohui Chen 2017 The University of Western Ontario

Metafork: A Compilation Framework For Concurrency Models Targeting Hardware Accelerators, Xiaohui Chen

Electronic Thesis and Dissertation Repository

Parallel programming is gaining ground in various domains due to the tremendous computational power that it brings; however, it also requires a substantial code crafting effort to achieve performance improvement. Unfortunately, in most cases, performance tuning has to be accomplished manually by programmers. We argue that automated tuning is necessary due to the combination of the following factors. First, code optimization is machine-dependent. That is, optimization preferred on one machine may be not suitable for another machine. Second, as the possible optimization search space increases, manually finding an optimized configuration is hard. Therefore, developing new compiler techniques for optimizing applications ...


A Scalable Approach For Lightweight Pointer Analysis, Vlas Zyrianov 2017 Kent State University

A Scalable Approach For Lightweight Pointer Analysis, Vlas Zyrianov

Undergraduate Research Symposium

A lightweight, flow-insensitive pointer analysis tool called srcPtr is presented. The research investigates various methods for pointer analysis to determine which are scalable to large scale software systems. Pointers are variable that indirectly reference other variables within a source code program. Pointer analysis is a non-trivial activity for determining what variables are being pointed by which pointer and how these indirect references can alter program behavior. Pointer analysis is critical for compiler optimization, impact analysis, fact extraction, debugging, and program comprehension. A prototype tool is being constructed as a test bed for determining what analysis approaches are scalable while simultaneously ...


Using Intel Realsense Depth Data For Hand Tracking In Unreal Engine 4, Granger Lang 2017 California Polytechnic State University, San Luis Obispo

Using Intel Realsense Depth Data For Hand Tracking In Unreal Engine 4, Granger Lang

Liberal Arts and Engineering Studies

This project describes how to build a hand tracking method for VR/AR using the raw data from a depth sensing camera.


Privacy In Context-Aware Mobile Crowdsourcing Systems, Thivya KANDAPPU, Archan MISRA, Shih-Fen CHENG, Hoong Chuin LAU 2017 Singapore Management University

Privacy In Context-Aware Mobile Crowdsourcing Systems, Thivya Kandappu, Archan Misra, Shih-Fen Cheng, Hoong Chuin Lau

Research Collection School Of Information Systems

Mobile crowd-sourcing can become as a strategy to perform time-sensitive urban tasks (such as municipal monitoring and last mile logistics) by effectively coordinating smartphone users. The success of the mobile crowd-sourcing platform depends mainly on its effectiveness in engaging crowd-workers, and recent studies have shown that compared to the pull-based approach, which relies on crowd-workers to browse and commit to tasks they would want to perform, the push-based approach can take into consideration of worker’s daily routine, and generate highly effective recommendations. As a result, workers waste less time on detours, plan more in advance, and require much less ...


Whole-System Analysis For Understanding Publicly Accessible Functions In Android, Huu Hoang NGUYEN, Lingxiao JIANG, Thanh Tho QUAN 2017 Singapore Management University

Whole-System Analysis For Understanding Publicly Accessible Functions In Android, Huu Hoang Nguyen, Lingxiao Jiang, Thanh Tho Quan

Research Collection School Of Information Systems

Android has become the most popular mobile operating system. Millions of applications, including many malwares, haven been developed for it. Android itself evolves constantly with changing features and higher complexities. It is challenging for application developers to keep up with the changes and maintain the compatibility of their apps across Android versions. Therefore, there are many challenges for application analysis tools to accurately model and analyze app behaviors across Android versions. Even though the overall system architecture of Android and many APIs are documented, many other APIs and implementation details are not, not to mention potential bugs and vulnerabilities. Techniques ...


Clcminer: Detecting Cross-Language Clones Without Intermediates, Xiao CHENG, Zhiming PENG, Lingxiao JIANG, Hao ZHONG, Haibo YU, Jianjun ZHAO 2017 Singapore Management University

Clcminer: Detecting Cross-Language Clones Without Intermediates, Xiao Cheng, Zhiming Peng, Lingxiao Jiang, Hao Zhong, Haibo Yu, Jianjun Zhao

Research Collection School Of Information Systems

The proliferation of diverse kinds of programming languages and platforms makes it a common need to have the same functionality implemented in different languages for different platforms, such as Java for Android applications and C# forWindows phone applications. Although versions of code written in different languages appear syntactically quite different from each other, they are intended to implement the same software and typically contain many code snippets that implement similar functionalities, which we call cross-language clones. When the version of code in one language evolves according to changing functionality requirements and/or bug fixes, its cross-language clones may also need ...


Detecting Similar Repositories On Github, Yun ZHANG, David LO, PAVNEET SINGH KOCHHAR, Xin XIA, Quanlai LI, Jianling SUN 2017 Singapore Management University

Detecting Similar Repositories On Github, Yun Zhang, David Lo, Pavneet Singh Kochhar, Xin Xia, Quanlai Li, Jianling Sun

Research Collection School Of Information Systems

GitHub contains millions of repositories among which many are similar with one another (i.e., having similar source codes or implementing similar functionalities). Finding similar repositories on GitHub can be helpful for software engineers as it can help them reuse source code, build prototypes, identify alternative implementations, explore related projects, find projects to contribute to, and discover code theft and plagiarism. Previous studies have proposed techniques to detect similar applications by analyzing API usage patterns and software tags. However, these prior studies either only make use of a limited source of information or use information not available for projects on ...


Collaboration Trumps Homophily In Urban Mobile Crowd-Sourcing, Thivya KANDAPPU, Archan MISRA, Randy Tandriansyah DARATAN 2017 Singapore Management University

Collaboration Trumps Homophily In Urban Mobile Crowd-Sourcing, Thivya Kandappu, Archan Misra, Randy Tandriansyah Daratan

Research Collection School Of Information Systems

This paper establishes the power of dynamic collaborative task completion among workers for urban mobile crowdsourcing. Collaboration is defined via the notion of peer referrals, whereby a worker who has accepted a location-specific task, but is unlikely to visit that location, offloads the task to a willing friend. Such a collaborative framework might be particularly useful for task bundles, especially for bundles that have higher geographic dispersion. The challenge, however, comes from the high similarity observed in the spatiotemporal pattern of task completion among friends. Using extensive real-world crowd-sourcing studies conducted over 7 weeks and 1000+ workers on a campus-based ...


Empath-D: Empathetic Design For Accessibility, Kenny Tsu Wei CHOO, Rajesh Krishna BALAN, Kiat Wee TAN, Archan MISRA, Youngki LEE 2017 Singapore Management University

Empath-D: Empathetic Design For Accessibility, Kenny Tsu Wei Choo, Rajesh Krishna Balan, Kiat Wee Tan, Archan Misra, Youngki Lee

Research Collection School Of Information Systems

We describe our vision for Empath-D, our system to enable Empathetic User Interface Design. Our key idea is to leverage Virtual and Augmented Reality (VR / AR) displays to provide an Immersive Reality environment, where developers/designers can emulate impaired interactions by elderly or disabled users while testing the usability of their applications. Our early experiences with the Empath-D prototype show that Empath-D can emulate a cataract vision impairment of the elderly and guide designers to create accessible web pages with less mental workload.


Decentralized Planning In Stochastic Environments With Submodular Rewards, Rajiv Ranjan KUMAR, Pradeep VARAKANTHAM, Akshat KUMAR 2017 Singapore Management University

Decentralized Planning In Stochastic Environments With Submodular Rewards, Rajiv Ranjan Kumar, Pradeep Varakantham, Akshat Kumar

Research Collection School Of Information Systems

Decentralized Markov Decision Process (Dec-MDP) providesa rich framework to represent cooperative decentralizedand stochastic planning problems under transition uncertainty.However, solving a Dec-MDP to generate coordinatedyet decentralized policies is NEXP-Hard. Researchershave made significant progress in providing approximate approachesto improve scalability with respect to number ofagents. However, there has been little or no research devotedto finding guarantees on solution quality for approximateapproaches considering multiple (more than 2 agents)agents. We have a similar situation with respect to the competitivedecentralized planning problem and the StochasticGame (SG) model. To address this, we identify models in thecooperative and competitive case that rely on submodular rewards ...


Competency Analytics Tool: Analyzing Curriculum Using Course Competencies, Swapna GOTTIPATI, Venky SHANKARARAMAN 2017 Singapore Management University

Competency Analytics Tool: Analyzing Curriculum Using Course Competencies, Swapna Gottipati, Venky Shankararaman

Research Collection School Of Information Systems

The applications of learning outcomes and competency frameworks have brought better clarity to engineering programs in many universities. Several frameworks have been proposed to integrate outcomes and competencies into course design, delivery and assessment. However, in many cases, competencies are course-specific and their overall impact on the curriculum design is unknown. Such impact analysis is important for analyzing, discovering gaps and improving the curriculum design. Unfortunately, manual analysis is a painstaking process due to large amounts of competencies across the curriculum. In this paper, we propose an automated method to analyze the competencies and discover their impact on the overall ...


Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk 2017 Boise State University

Let’S Try Something New: Service Learning In Boise State's Computer Science Department, Daniel Kondratyuk

International Journal of Undergraduate Community Engagement

In this article I explain how a group of Computer Science students at Boise State University participated in a new service learning project. I provide a few testimonials on the students’ experiences and describe the rewarding aspects of service learning in the greater Computer Science community.


Iphone Swift 3 Development For “What’S Good?”, Cameron Reilly 2017 The University of Akron

Iphone Swift 3 Development For “What’S Good?”, Cameron Reilly

Honors Research Projects

Cameron Reilly

Major: Computer Science Management Track

Project Sponsor: Michael Collard

What’s Good?

“What’s Good?” is an iOS application that uses augmented reality to present information about nearby restaurants to the user in real time. Users can hold up their device and look through their camera to see information presented above the restaurant including it’s name, average cost, and average review rating. The user’s location is gathered and used in tandem with the Zomato API to select what data display as those dining locations are currently near the user. Using the gyroscope, compass, and accelerometer to ...


Digital Commons powered by bepress